Basic Computer Security/Further Reading

< Basic Computer Security
Computer security
— models
— software
Operating system —
Free security software
Security testing tools
— network
Internet security
Web security exploits
Cross-site scripting
Cyberattacks
Network analyzers
Computer access control
— exploits
Malware
Malware by type
Types of malware
Ransomware
Injection exploits
Cryptographic attacks
Covert channel
Data security
Cryptography
Cryptographic hash functions
Broken cryptography algorithms
Symmetric-key algorithm
Session key
Public-key cryptography (Asymmetric key encryption)
Public key infrastructure
Diffie–Hellman key exchange
Public-key encryption schemes
Naccache–Stern knapsack cryptosystem
RSA
Cryptographic protocols
Encryption
Stream cipher
Block ciphers
Advanced Encryption Standard
Data security
Mobile security
Cybercrime
Hacking
Vulnerability
Social engineering
Humor
Evil bit


Further reading

https://security.stackexchange.com


Books

Hacking tools
S in The Computer Revolution


Courses

https://www.udemy.com/topic/cyber-security/
https://www.futurelearn.com/subjects/it-and-computer-science-courses/cyber-security
https://www.coursera.org/browse/information-technology/security
This article is issued from Wikibooks. The text is available under Creative Commons Attribution-Share Alike 4.0 unless otherwise noted. Additional terms may apply for the media files.